TROYANOSYVIRUS
Back to CVEs

CVE-2023-39320

CRITICAL
9.8

Description

The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software.

CVE Details

CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published9/8/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

golang:go

Weaknesses (CWE)

CWE-94

References

https://go.dev/cl/526158(security@golang.org)
https://go.dev/issue/62198(security@golang.org)
https://go.dev/cl/526158(af854a3a-2127-422b-91ae-364da2661108)
https://go.dev/issue/62198(af854a3a-2127-422b-91ae-364da2661108)
https://pkg.go.dev/vuln/GO-2023-2042(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202311-09(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20231020-0004/(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.